Title | ||
---|---|---|
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows |
Abstract | ||
---|---|---|
Cyber-attacks on the automotive controller area network (CAN) have recently been shown to be achievable and potentially disruptive or deadly. Detecting an attack quickly will require the development of intrusion detection systems that can cope with the rapid broadcast of CAN data, the comparatively limited computational power of automotive components, and the proprietary nature of CAN data specifications. This paper presents an analysis of CAN broadcasts and consequent testing of statistical methods to detect timing changes in the CAN traffic indicative of some predicted attacks. The detection is implemented in time-defined windows. The generation of simulated attack data, and the determination of positive detections, are also considered. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/DSN-W.2018.00069 | 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) |
Keywords | Field | DocType |
CAN,in-vehicle network,cybersecurity,anomaly detection | CAN bus,Broadcasting,Anomaly detection,Microsoft Windows,Computer science,Network packet,Real-time computing,Intrusion detection system,Automotive industry | Conference |
ISSN | ISBN | Citations |
2325-6648 | 978-1-5386-6708-8 | 0 |
PageRank | References | Authors |
0.34 | 9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Andrew Tomlinson | 1 | 0 | 0.34 |
Jeremy W. Bryans | 2 | 175 | 13.88 |
Siraj A. Shaikh | 3 | 90 | 13.85 |
Harsha K. Kalutarage | 4 | 27 | 6.01 |